June 1, 2013
By Robert K. Ackerman
A U.S. Air Force network administrator employs a laptop at Kandahar Airfield, Afghanistan.

Dealing with virtual challenges may require a meeting of different disciplines.

May 24, 2013
By Max Cacas

The Defense Department is teaming up with a well-known cloud computing giant to resolve security concerns.

Over the next several months, the Defense Information Systems Agency (DISA) will partner with Google to learn how to implement critical security capabilities in a cloud computing environment. The pilot program, involving selected members of DISA’s staff, will explore how the U.S. Defense Department will implement security when it begins to offer cloud computing services to the military in the future.

May 3, 2013
by Max Cacas

The revision reflects efforts of government-wide joint task force.

Managers of information technology systems for the federal government have new mandatory guidance on security and privacy controls used to manage and protect those systems from cyber attack.

March 1, 2013
By Max Cacas

When it comes to popular smartphones and tablets, security can be a many-layered and necessary endeavor

The growing use of advanced mobile devices, coupled with the increase in wireless broadband speed, is fueling demand by employees to bring their own devices to the job. This situation has opened a new set of security challenges for information technology staff, especially when it comes to the use of apps.

February 26, 2013
By George I. Seffers

Homeland Security Conference 2013 Show Daily, Day 1

All too often, cyber and physical protection are considered separately, when really they go hand-in-hand, according to experts speaking at the first day of the AFCEA Homeland Security Conference in Washington, D.C., February 26, 2013. The conference opened with a half-day of conversation about hackers, terrorists and natural disasters and addressed concerns involving both physical infrastructure and the cyber environment for all kinds of attacks, be they physical, virtual or even natural in origin.

January 31, 2013
By Robert K. Ackerman
John Smart, president of the Acceleration Studies Foundation, tells the keynote luncheon audience that dramatic change is evolutionary and inevitable.

West 2013 Online Show Daily, Day 2

Quote of the Day: “How can you help me make the least-dumb decisions quicker?”—Terry Halvorsen, chief information officer (CIO) for the Department of the Navy, requesting cyber security solutions from industry

February 1, 2013
By Robert K. Ackerman

West 2013 Online Show Daily, Day 3

January 1, 2013
By Robert K. Ackerman

The shift of U.S. power to the Asia-Pacific will not be successful without an infusion of new technology and a dedicated effort to defeat a wide range of adversaries. The new strategic emphasis on the Asia-Pacific region poses a new set of challenges, mandating solutions that run the gamut from technological capabilities to cultural outreach and diplomacy.

On the military side, direct challenges range from dealing with cyberspace attacks to providing missile defense in a large-scale conflict. On the geopolitical side, centuries of conflict and confrontation among neighbors must be overcome if a region-wide security environment enabling economic growth is to be implemented.

January 7, 2013
By Rita Boland

The release of the National Intelligence Council's Global Trends 2030: Alternative Worlds report in early December spawned a wave of media attention and crashed two websites hosting the document. For the first several days, officials tracked approximately 60,000 Tweets pertaining to the information sent out every 20 minutes. "The first thing to say is that the amount of response and amount of attention focused on it came really as a surprise to us ... it did really go viral in a way we didn't appreciate beforehand," states Dr.

November 30, 2012
By Max Cacas

U.S. Air Force Cyber Summit raises leadership awareness on service’s roles and responsibilities.

November 29, 2012
By Max Cacas

The report on the power transmission system was delayed by government officials for security reasons.

November 14, 2012
By Robert K. Ackerman

Hactivists who harvest information and publish it to embarass people or organizations are the leading trend among Internet malefactors, according to a communications security specialist. Marcus H. Sachs, vice president, national security policy for Verizon, told the audience at TechNet Asia-Pacific 2012 in Honolulu, Hawaii, that hack-and-leak activities are becoming the new challenge for young computer minds.

November 14, 2012
By Robert K. Ackerman

Relatively conventional means are allowing hackers, spies and criminals to penetrate computer networks in spite of longstanding security measures. Some of this success stems from new ways of entering networks, but most of it represents simple efforts that exploit lax security attitudes.

October 1, 2012
By Max Cacas

A new computing architecture emphasizes shared resources.

The nation’s intelligence community has embarked on a path toward a common computer desktop and a cloud computing environment designed to facilitate both timely sharing of information and cost savings. The implementation could result in budget savings of 20 to 25 percent over existing information technology spending within six years, but the ramifications could include large cultural changes that result both in lost jobs and business for industry partners.

October 1, 2012
By Max Cacas

The National Intelligence University prepares for its fifth decade with a shift in focus and a change in venue.

The National Intelligence University, which provides advanced training to U.S. intelligence professionals, is transitioning from an institution primarily focused on the U.S. Defense Department to one serving the entire intelligence community. This reflects the new emphasis toward sharing and collaboration within the nation's intelligence apparatus.

October 1, 2012
By Robert K. Ackerman

New common goals open doors for more efficient approaches to information sharing.

Technological and cultural barriers are falling away as intelligence community organizations strive to establish a collaborative environment for sharing vital information. This thrust may be a case of an urgent need overcoming traditional obstacles as onetime rival groups embrace cooperation with the goal of building a synergistic information realm.

June 2011
By Petr Jirásek, SIGNAL Magazine


The Automatic Liberal and User-Centric Electronic Identity, or ALUCID, security system takes a new approach to authentication to wed user convenience with security requirements.

The need to compromise security protocols may become passé.

August 17, 2009
By Maryann Lawlor


Staff Sgt. William Powell, USAF, scans a CAC at the Peterson Air Force Base west gate. The card is registered with the Defense Biometric Identification System (DBIDS), and information can be shared with other programs that now are being tested for
identity verification on military bases.

August 2008
By Maryann Lawlor

Senior Airman Bernard Lee, USAF, Multinational Force–Iraq (MNF-I), plays the part of a contractor during a retinal scan demonstration at the MNF-I badging office. The scan is part of the security clearance and identification process for issuing official badges to contractors at the Ali Base in Iraq.
Automated processes target bottlenecks in current procedures.

October 2007
By Rita Boland

High-ranking U.S. Department of Homeland Security officials review key information during a teleconference briefing. The ability for government agencies to share and protect sensitive information may be key to effective disaster response as well as other internal and external operations.
Consortium offers answers in the form of architecture.